SOC 2 Penetration Testing for Bay Area SaaS Companies | Lorikeet Security Skip to main content
Back to Blog

SOC 2 Penetration Testing for Bay Area SaaS Companies

Lorikeet Security Team April 12, 2026 9 min read

If you are building a SaaS company in San Francisco, the South Bay, or anywhere along the Peninsula, SOC 2 compliance is not an abstract future concern. It is the thing blocking your next enterprise deal. And within SOC 2, penetration testing is the piece that causes the most friction — either because founders put it off too long, or because they run the wrong kind of test and have to redo it during the audit. This guide covers what Bay Area SaaS companies specifically need to know about SOC 2 penetration testing: the trust criteria it satisfies, how to scope it correctly, common mistakes Silicon Valley startups make, a realistic timeline, and what it actually costs.


Why Enterprise Buyers Demand SOC 2

SOC 2 has become the de facto security credential for B2B SaaS in the United States. A few years ago, an enterprise security questionnaire might have been enough to move a deal forward. Today, procurement and vendor risk teams at mid-market and enterprise companies — especially in financial services, healthcare, and technology — require a current SOC 2 Type II report before a contract goes to legal review. This is not negotiable at most companies above $1 billion in revenue.

The driver is accountability. A SOC 2 Type II report tells a prospective customer that an independent CPA firm examined your security controls over a defined observation period — typically 12 months — and found them to be operating effectively. A security questionnaire tells them you answered questions about your controls. The difference matters to enterprise risk committees.

For Bay Area SaaS companies, this pressure is particularly acute. San Francisco and Silicon Valley are home to a disproportionate share of the world's technology enterprise buyers. Your customers' security teams are sophisticated, your sales cycles are competitive, and a SOC 2 gap will show up in due diligence. Getting to Type II before your Series B is increasingly a precondition for landing the enterprise logos that justify that raise.

The enterprise sales reality: If a Fortune 500 customer asks for your SOC 2 report and you do not have one, you will almost certainly lose the deal or get put into a multi-quarter remediation backlog while they work with a compliant competitor. The cost of that lost deal exceeds the cost of SOC 2 by an order of magnitude at any reasonable contract value.


Penetration Testing as Evidence for CC6 and CC7

SOC 2 does not mention penetration testing by name anywhere in the Trust Services Criteria. This causes confusion. Some founders interpret this to mean pentesting is optional. Their auditors will correct that interpretation.

The criteria that drive the auditor expectation of a pentest are in the Common Criteria (CC) for the Security trust service category, which is mandatory for every SOC 2 engagement:

When your auditor reviews your evidence for these criteria during a SOC 2 examination, a penetration test report is the expected artifact. Its absence does not mean you automatically fail, but it does mean the auditor will either issue a management letter comment or require alternative evidence that is harder to produce. In practice, the path of least resistance is to run an annual pentest, remediate findings, and present the report and remediation evidence to the auditor.

For a deeper breakdown of what auditors specifically review in pentest reports, see our guide on SOC 2 penetration testing requirements.


How to Scope a Pentest for SOC 2

Scoping a SOC 2 penetration test correctly is the single most important decision in the process. An under-scoped test will produce findings the auditor considers insufficient. An over-scoped test wastes budget on systems that are not in your SOC 2 boundary. The right scope is determined by your system description — the document in your SOC 2 report that defines the systems and services being examined.

What Should Always Be In Scope

For a typical Bay Area SaaS product, the following components should be in scope for the penetration test if they are referenced in your system description:

Defining Your System Description First

If you have not yet written your system description, write it before you scope the pentest. The system description drives the audit scope, which drives the pentest scope. Many founders scope the pentest based on what they think is important and then discover during the audit that the system description covers additional components that were not tested. Get alignment with your auditor on the system description before you engage a pentest firm.

Common scoping mistake: A SaaS company scopes their pentest to include the production web application but excludes the internal admin portal because it is "only used by employees." The auditor notes that the system description references the admin portal as a component of the service. The pentest evidence does not cover it. This becomes an exception. Always include the admin surface.


Common Pitfalls Bay Area Startups Hit

Having worked with dozens of Bay Area SaaS companies through their first and subsequent SOC 2 audits, certain mistakes appear repeatedly. They are preventable once you know to look for them.

Running a Vulnerability Scan and Calling It a Pentest

Automated vulnerability scanners — Tenable, Qualys, Nessus — produce reports that look like penetration test reports. They are not. Auditors know the difference. A vulnerability scan identifies known vulnerabilities in software versions and configurations. A penetration test involves a human tester actively attempting to exploit those vulnerabilities, chain them together to escalate access, and discover business logic flaws that scanners cannot find. Submitting a scanner report as your SOC 2 pentest evidence is a fast path to a management letter comment and a delayed audit report.

Scheduling the Pentest Outside the Audit Window

SOC 2 Type II examinations cover a defined observation period, typically 12 months. The pentest must fall within that observation period to serve as evidence for that audit. A test completed in January 2025 does not satisfy an auditor examining the period from April 2025 to March 2026. Schedule the pentest early enough in your audit period that remediation and retesting are complete before the examination closes. Leaving the pentest to the last quarter of the audit period leaves no room for remediation.

Not Tracking Remediation

A pentest report with critical and high-severity findings is expected — it means the test found something. What the auditor cares about is that you fixed it. The evidence they want is ticket-level remediation tracking: a Jira or Linear issue for each finding, assigned to an owner, with a due date, marked complete, and linked to a retest result confirming the fix. Saying "we fixed everything" without ticket evidence is not sufficient for a SOC 2 audit.

Using a Firm Without SOC 2 Experience

Not every penetration testing firm understands SOC 2 evidence requirements. A firm that does general security consulting may produce a technically excellent report that does not map findings to Trust Services Criteria, does not structure evidence in a way auditors expect, and does not include a retest cycle. Ask prospective firms explicitly whether their reports are structured for SOC 2 auditors, whether they map findings to TSC, and whether retesting is included in the engagement.

Underscoping Because of Budget Pressure

Penetration testing budgets are often negotiated down during cost-cutting exercises. The resulting scope is sometimes too narrow to satisfy the auditor. A web-app-only test when the system description includes APIs and cloud infrastructure produces an evidence gap. It is more cost-effective to scope the test correctly the first time than to run a supplemental test to fill gaps the auditor identifies.


Timeline: From Zero to SOC 2 Type II

The typical timeline for a Bay Area SaaS company starting from no compliance program to a SOC 2 Type II report is 9 to 12 months. Here is how the penetration testing milestone fits into that timeline:

Phase Duration Pentest Activity
Scoping and Readiness Months 1-2 Define system description; select pentest firm; write pentest scope
Control Implementation Months 2-3 Implement technical controls the pentest will validate
Observation Period Begins Month 3 Schedule pentest; conduct engagement (typically 1-2 weeks)
Remediation Months 3-5 Track and close findings; schedule retest; collect evidence
Audit Fieldwork Months 9-11 Provide pentest report, remediation tickets, and retest results to auditor
Final Report Months 10-12 Pentest evidence reviewed; no exceptions if properly documented

The most common timeline mistake is starting the pentest in month 8 or 9 of the observation period. This leaves four to eight weeks for remediation and retest before the audit examines the period. Critical findings discovered in month 9 with 30-day remediation SLAs cannot be closed before the audit window. The auditor sees open critical findings. Schedule the pentest in the first half of your observation period.

If you are approaching an audit deadline and have not yet run a penetration test, see our guide on SOC 2 for startups timeline for how to compress the process without creating evidence gaps.


Cost Considerations for Bay Area Companies

Bay Area SaaS companies face a specific pricing dynamic in the penetration testing market. Local firms headquartered in San Francisco, Palo Alto, or San Jose price their services to cover regional costs. A web application and API engagement from a Bay Area firm typically runs $18,000 to $40,000 for a reasonably scoped SaaS product. Adding cloud configuration review pushes that higher.

Remote-first penetration testing firms deliver work of equivalent — and often superior — technical quality at significantly lower price points because they are not carrying Bay Area office overhead or Bay Area salary costs. The same engagement scope runs $8,000 to $20,000 with a remote-first provider. The deliverable is the same: a formal report, finding severity ratings, remediation guidance, and a retest cycle.

Here is a realistic cost breakdown for a first-time SOC 2 Type II at a Bay Area SaaS company:

Cost Item Local Bay Area Firm Remote-First Firm
Web app + API pentest $18,000-$35,000 $8,000-$16,000
Cloud configuration review $8,000-$15,000 $4,000-$8,000
Retest cycle Often additional cost Often included
Compliance automation platform $10,000-$20,000/year $10,000-$20,000/year
SOC 2 audit (CPA firm) $15,000-$40,000 $15,000-$40,000
Total first-year estimate $51,000-$110,000 $37,000-$84,000

The savings from choosing a remote-first pentest provider are real and meaningful for a startup managing burn rate. The money saved is better spent on fixing the vulnerabilities the test finds, not on someone else's commercial office lease in SoMa.

For a full breakdown of what drives pentest pricing, see our guide on transparent pentest pricing.


What to Look for in a SOC 2 Pentest Provider

Selecting the right penetration testing firm for your SOC 2 is a vendor risk decision. The wrong firm produces a report that creates more problems than it solves. When evaluating providers, look for the following:

View our full penetration testing services for Bay Area companies, or start a PTaaS engagement if you need ongoing testing coverage that keeps pace with your development cycle.


Continuous Testing After Your First SOC 2

Your first SOC 2 Type II is the beginning of an annual cycle, not a one-time project. Every subsequent audit period requires a new penetration test within the observation window. Bay Area SaaS companies that ship code weekly or daily face a growing gap between annual penetration tests. A vulnerability introduced in month 2 of the audit period could remain undetected for 10 months if you only test annually.

Penetration Testing as a Service (PTaaS) addresses this by providing ongoing access to a testing team that retests as your product changes. Rather than scheduling a one-time engagement once per year, you engage a team that tests new features, significant infrastructure changes, and API additions as they deploy. The annual report for the auditor covers a continuous testing program rather than a single point-in-time assessment. Auditors view this favorably.

For companies at Series B and beyond with significant engineering velocity, continuous testing is often the more practical approach to satisfying CC7.1 and CC7.2 across the full audit period.

SOC 2 Penetration Testing for Bay Area SaaS

Lorikeet Security works with San Francisco and Silicon Valley SaaS companies on SOC 2-ready penetration testing. Our reports map findings to Trust Services Criteria, include remediation retesting, and are structured for auditor review. We work around your audit timeline.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!